單項(xiàng)選擇題How many messages does Internet Key Exchange use to negotiate SA characteristics when it runs inaggressive mode?()

A.3
B.4
C.5
D.2
E.6


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which three statements about NetFlow are true? ()

A.LCP is used for PPP over ATM (PPPoA) setup.
B.LCP is used for PPP over Ethernet (PPPoE) setup.
C.LCP is used for PPP over Ethernet (PPPoPR) setup.
D.LCP is used for PPP CHAP authentication.
E.LCP is used for basic PPP link setup and operation.

2.多項(xiàng)選擇題Which three statements about NetFlow are true?()

A.NetFlow records unidirectional IP traffic flow.
B.NetFlow records MPLS frame flow.
C.NetFlow expert is only over TCP.
D.NetFlow records is only over UDP.
E.NetFlow records subinterface information of traffic flow.

3.多項(xiàng)選擇題Which three modes are the operating of HDLC?()

A.asynchronous balanced mode (ABM)
B.normal response mode (NRM)
C.normal peer mode (NPM)
D.asynchronous client mode (ACM)
E.asynchronous response mode (ARM)

4.多項(xiàng)選擇題Which three of these statements about the IP service level agreement (SLA) sender are true? ()

A.SLA sender target can be an IP host
B.SLA sender sends a probe packet and a response probe packet
C.SLA sender sends a probe packet
D.SLA sender target must be a router
E.SLA sender target can be an IP SLA responder

5.多項(xiàng)選擇題Which three of these statements about PPPoP are true?()

A.You must install PPPoP client software on all hosts that connects to the Ethernet segment this means that the access provider must maintain a CPE
B.PPPoP can provide a host with access to a destination over Ethernet. You can have only one PPPoPsession per PVC
C.PPPoP implementation is susceptible to broadcast storms and possible denial-of-service attacks
D.You cannot use PPPoP with Cisco Service Selection Gateway
E.Per-session accounting is possible, which allows the service provider to charge the subscribe based onsession time for various services offered. The service provider can also require a minimum access change

最新試題

Which two routers support cable access?()

題型:多項(xiàng)選擇題

Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()

題型:多項(xiàng)選擇題

Which statement about the use of Route Target Rewrite is true?()

題型:?jiǎn)雾?xiàng)選擇題

Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()

題型:多項(xiàng)選擇題

Which option describes a benefits of IPv6 VPN Provider Edge?()

題型:?jiǎn)雾?xiàng)選擇題

Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()

題型:?jiǎn)雾?xiàng)選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:?jiǎn)雾?xiàng)選擇題

Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()

題型:?jiǎn)雾?xiàng)選擇題

What is the BGP synchronization rule?()

題型:?jiǎn)雾?xiàng)選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:?jiǎn)雾?xiàng)選擇題